Fraud Mitigation Techniques

Introduction

Our Card-Not-Present (CNP) Fraud Mitigation Techniques white paper provides in-depth information regarding several Fraud Mitigation techniques.  These techniques are now categorized by use case, channel, and stakeholder for each. The objective is to allow you learn more easily about the techniques that meet your needs.

The fraud mitigation techniques were compiled and written by payments industry leaders with a wide array of perspectives and expertise, and as more data becomes available, this page will grow. All information can be filtered using the box selections below, which will direct you to specific documentation regarding your selection.  This documentation contains information on the selected technique, including applicability to the various channels, use cases, stakeholders, technical features and risks plus links to sources for further reading.

Please note: The information and materials available on this web page (“Information”) is provided solely for convenience and does not constitute legal or technical advice. All representations or warranties, express or implied, are expressly disclaimed, including without limitation, implied warranties of merchantability or fitness for a particular purpose and all warranties regarding accuracy, completeness, adequacy, results, title and non-infringement. All Information is limited to the scenarios, stakeholders and other matters specified, and should be considered in light of applicable laws, regulations, industry rules and requirements, facts, circumstances and other relevant factors. None of the Information should be interpreted or construed to require or promote the establishment of any solution, practice, configuration, rule, requirement or specification inconsistent with applicable legal requirements, any of which requirements may change over time. The U.S. Payments Forum assumes no responsibility to support, maintain or update the Information, regardless of any such change. Use of or reliance on the Information is at the user’s sole risk, and users are strongly encouraged to consult with their respective payment networks, acquirers, processors, vendors and appropriately qualified technical and legal experts prior to all implementation decisions.

Share this